This article introduces a simple and effective new algorithm for image encryption using a chaotic system which is based on the magic squares. This novel 3D chaotic system is invoked to generate a random key to encrypt any color image. A number of chaotic keys equal to the size of the image are generated by this chaotic system and arranged into a matrix then divided into non-overlapped submatrices. The image to be encrypted is also divided into sub-images, and each sub-image is multiplied by a magic matrix to produce another set of matrices. The XOR operation is then used on the resultant two sets of matrices to produce the encrypted image. The strength of the encryption method is tested in two folds. The first fold is the security analysis ...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
In this paper, we will provide an overview of the mechanisms used in image protection, especially Ch...
Currently, images are very important with the rapid growth of communication networks. Therefore, ima...
The chaos-based image cryptosystems have been widely investigated in recent years to provide real-ti...
A feedback chaotic image encryption scheme based on both bit-level and pixel-level Guodong Ye1,2 and...
This paper proposes an effective chaos-based encryption algorithm specialised for images. A system o...
Currently, images are very important with the rapid growth of communication networks. Therefore, ima...
Hundreds of image encryption algorithms have been developed for the security and integrity of images...
Abstract:- In this paper we design a new practical computer algorithm based on chaotic map lattices ...
Recently, great concerns have been raised regarding the issue of medical image protection due to the...
The process of encoding any given piece of information or data using a particular selection of avail...
There are some good combinatorial structures suitable for image encryption. In this study, a new cha...
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorith...
In this paper, we will provide an overview of the mechanisms used in image protection, especially Ch...
In the context of cryptography applications, using Chaos-based approaches, methods and techniques fo...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
In this paper, we will provide an overview of the mechanisms used in image protection, especially Ch...
Currently, images are very important with the rapid growth of communication networks. Therefore, ima...
The chaos-based image cryptosystems have been widely investigated in recent years to provide real-ti...
A feedback chaotic image encryption scheme based on both bit-level and pixel-level Guodong Ye1,2 and...
This paper proposes an effective chaos-based encryption algorithm specialised for images. A system o...
Currently, images are very important with the rapid growth of communication networks. Therefore, ima...
Hundreds of image encryption algorithms have been developed for the security and integrity of images...
Abstract:- In this paper we design a new practical computer algorithm based on chaotic map lattices ...
Recently, great concerns have been raised regarding the issue of medical image protection due to the...
The process of encoding any given piece of information or data using a particular selection of avail...
There are some good combinatorial structures suitable for image encryption. In this study, a new cha...
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorith...
In this paper, we will provide an overview of the mechanisms used in image protection, especially Ch...
In the context of cryptography applications, using Chaos-based approaches, methods and techniques fo...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
In this paper, we will provide an overview of the mechanisms used in image protection, especially Ch...
Currently, images are very important with the rapid growth of communication networks. Therefore, ima...